Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2863: Path Traversal in feng_ha_ha ssm-erp

0
Medium
VulnerabilityCVE-2026-2863cvecve-2026-2863
Published: Sat Feb 21 2026 (02/21/2026, 06:02:09 UTC)
Source: CVE Database V5
Vendor/Project: feng_ha_ha
Product: ssm-erp

Description

CVE-2026-2863 is a medium severity path traversal vulnerability in the deleteFile function of the FileServiceImpl. java component within the feng_ha_ha ssm-erp and production_ssm products. This flaw allows remote attackers to manipulate file paths, potentially deleting arbitrary files on the server without authentication or user interaction. The product uses continuous delivery with rolling releases, complicating version tracking and patch availability. Although an exploit has been published, no confirmed active exploitation is reported yet. The vendor has been notified but has not responded, leaving systems exposed. The vulnerability’s CVSS 4. 0 score is 5. 3, reflecting moderate impact with low attack complexity and no privileges required. Organizations using these ERP systems should prioritize mitigation to prevent unauthorized file deletions that could disrupt operations or compromise data integrity.

AI-Powered Analysis

AILast updated: 02/21/2026, 06:31:28 UTC

Technical Analysis

CVE-2026-2863 identifies a path traversal vulnerability in the deleteFile method of the FileServiceImpl.java file within the feng_ha_ha ssm-erp and production_ssm software products. The flaw arises from insufficient validation or sanitization of file path inputs, enabling an attacker to craft malicious requests that traverse directories outside the intended file scope. This can lead to deletion of arbitrary files on the server, potentially affecting system stability, data integrity, and availability. The vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. The affected software is delivered via continuous delivery with rolling releases, making it difficult to pinpoint specific vulnerable versions or confirm patch availability. The vendor has been informed but has not issued a fix or response. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and partial impact on integrity and availability. While no active exploitation has been confirmed, a public exploit exists, increasing the likelihood of future attacks. The dual branding of the product under different names may complicate detection and mitigation efforts.

Potential Impact

The primary impact of this vulnerability is unauthorized deletion of files on affected servers, which can lead to data loss, disruption of ERP operations, and potential denial of service. Deleting critical configuration or data files could impair business processes, cause downtime, and require costly recovery efforts. Since the vulnerability can be exploited remotely without authentication, attackers can leverage it to compromise systems at scale. The partial impact on integrity and availability means that while confidentiality is not directly affected, the reliability and continuity of ERP services are at risk. Organizations relying on ssm-erp or production_ssm for enterprise resource planning may face operational interruptions, financial losses, and reputational damage if exploited. The lack of vendor response and patch availability prolongs exposure, increasing the window for attackers to develop and deploy exploits.

Mitigation Recommendations

1. Implement strict input validation and sanitization on all file path parameters, especially in the deleteFile function, to prevent directory traversal sequences such as '../'. 2. Employ allowlisting of permissible file paths and restrict file operations to designated directories only. 3. Monitor and log file deletion requests to detect anomalous or suspicious activity indicative of exploitation attempts. 4. Use web application firewalls (WAFs) with rules designed to detect and block path traversal payloads targeting the ERP system. 5. Isolate the ERP application environment with least privilege file system permissions to limit the impact of any unauthorized file deletions. 6. Engage with the vendor or community to obtain patches or updates as soon as they become available, and apply them promptly. 7. Conduct regular security assessments and penetration testing focused on file handling functionalities. 8. If possible, implement network segmentation to limit exposure of the ERP system to untrusted networks. 9. Educate system administrators about this vulnerability and encourage vigilance for unusual system behavior or error logs related to file operations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T14:17:44.232Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69994df7be58cf853b531474

Added to database: 2/21/2026, 6:17:27 AM

Last enriched: 2/21/2026, 6:31:28 AM

Last updated: 2/21/2026, 7:26:18 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats